Detection of Phishing Websites


Authors : Avaneesh C S; Varun Ganapathy S; Vasanth E; Ranjeethapriya

Volume/Issue : Volume 9 - 2024, Issue 4 - April

Google Scholar : https://tinyurl.com/2mese959

Scribd : https://tinyurl.com/5b4n3wns

DOI : https://doi.org/10.38124/ijisrt/IJISRT24APR2269

Abstract : Phishing is a cyber attack in which an attacker creates a copy of an existing web page to trick users into submitting personal, financial or password information, making them think that this is the real website that everyone uses. The strategy followed here is an edge server-based anti-phishing algorithm called “Link Guard” uses the property of hyperlinks in phishing attacks. The purpose of this Link Guard algorithm is to find phishing emails sent by phishers to obtain information about end users. Link Guard carefully analyzes the characteristics of phishing hyperlinks. That's why all end users use it using the Link Guard algorithm. By doing this, end users catch and don’t respond tp phishing emails. Because Link Guard is based not only on the detection and prevention of phishing attacks, but also on unknown attacks. This project uses PHP and MySQL server. The program uses a link protection method that detects phishing content based on the characteristics of phishing hyperlinks. In the hyperlink distribution method, important information is collected from victims; Phishers often try to trick users into clicking on hyperlinks embedded in phishing emails. The link protection algorithm works by analyzing the difference between apparent links and real links. The Link Guard algorithm also evaluates similarity to established trustworthy sources. The Link Guard algorithm functions by initially extracting DNS names from both genuine and apparent DNS names, followed by a comparison between the two sets of DNS names.

Keywords : Phishing Detection, Link Guard Algorithm, Emailsecurity, Classification of Phishing Hyperlinks.

References :

  1. Mohamed Abdelkarim Remmide, FatimaBoumahdi, Narhimene Boustiaa, Chalabia Lilia Feknous, Romaissa Della DETECTION OF PHISHING URLS USING TEMPORAL CONVOLUTIONAL NETWORK, Universit´ eBLIDA1, Laboratoire LRDSI, Facult´ eSciences, B.P270, Route de Soumaa, BLIDA, ALGERIE
  2. Abdulhamit Subasi, Emir Kremic, COMPARISON OF ADABOOST WITH MULTIBOOSTING FOR PHISHING WEBSITE DETECTION, Effat University, College of Engineering, Jeddah, 21478, Saudi Arabia, Federal Institute of Statistics, Sarajevo. 71000, Bosnia and Herzegovina
  3. Asadullah Safi, Satwinder Singh, A SYSTEMATIC LITERATURE REVIEW ON PHISHING WEBSITE DETECTION TECHNIQUES, Nangarhar University, Ministry of Higher Education, Afghanistan, Dept. of Computer Science & Technology, Central University of Punjab, Bathinda, Punjab, India
  4. Saad Al-Ahmadi, Yasser Alharbi, A DEEP LEARNING TECHNIQUE FOR WEB PHISHING DETECTION COMBINED URL FEATURES AND VISUAL SIMILARITY, College of Computer and Information Science, Computer Science Department, King Saud University, Riyadh, Saudi Arabia
  5. Ayesha Arshad, Attique Ur Rehman, Sabeen Javaid, Javed Anjum Sheikh, Muhammad Azeem, Tahir Muhammad Ali, A SYSTEMATIC LITERATURE REVIEW ON PHISHING AND ANTI-PHISHING TECHNIQUES, Department of Software Engineering, University of Sialkot, Sialkot, Pakistan, Department of Computer Science, Gulf University of Science and Technology, Kuwait
  6. Jian Mao, Jingdong Bian, Wenqian Tian, Shishi Zhu, Tao Weic, Aili Li, Zhenkai Liang, Detecting Phishing Websites via Aggregation Analysis of Page Layouts, "School of Electronic and Information Engineering, Beihang University, Beijing 100183, China Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, Shanghai 200240, China Baidu USA LLC., Sunnyvale, CA 94089, USA, Information Technology Service Center, China National Petroleum Corporation, Beijing 100007, China, School of Computing. National University of Singapore, Singapore 117417, Singapore
  7. Dong-Jie Liu, Guang-Gang Geng, Xiao-Bo Jin , Wei Wang ,An efficient multistage phishing website detection model based on the CASE feature framework: Aiming at the real web environment, Computer Network Information Center, Chinese Academy of Sciences, Beijing, China b University of Chinese Academy of Sciences, Beijing, China c College of Cyber Security, Jinan University, Guangzhou 510632, China
  8. Mouad Zouina1 and Benaceur Outtaj A novel lightweight URL phishing detection system using SVM and similarity index An efficient multistage phishing website detection model based on the CASE feature framework: Aiming at the real web environment Mohammed V University of Rabat, Rabat, Morocco
  9. ABB Corporate Research P. Cunha, J. Brandão, J. Vasconcelos, F. Soares and V. Carvalho, "Augmented reality for cognitive and social skills improvement in children with ASD," 20 13th International Conference on Remote Engineering and Virtual Instrumentation (REV), Madrid, 2020, pp. 334-335, doi: 10.1109/REV.2016.7444495.
  10. Chandrasekaran, M., Narayanan, K., Upadhyaya, S.: Phishing email detection based on structural properties. In: NYS CyberSecurity Conf.
  11. Garera, S., Provos, N., Chew, M., Rubin, A.: A framework for detection and measurement of phishing attacks. In: Proc. 2007 ACM Workshop on Recurring Malcode, pp. 1–8.
  12. Abu-Nimeh, S., Nappa, D., Wang, X., Nair, S., 2007. A comparison of machine learning techniques for phishing detection. In: Anti-Phishing Working Groups Ecrime Researchers Summit. pp.
  13. Bottazzi, G., Casalicchio, E., Cingolani, D., Marturana, F., Piu, M., 2015. MP-shield: A framework for phishing detection in mobile devices. Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Se, 1977– 1983.
  14. Lotter A., Futcher L.: A Framework to assist Email users in the identification of Phishing Mails. In: Proc. 8th Int‟l Symposium on Human Aspects of Information Security and Assurance.
  15. Wardman, B., Stallings, T., Warner, G., Skjellum, A., Nov 2011. High- performance content-based phishing attack detection. In: eCrime Re- searchers Summit. IEEE, San Diego, CA,

Phishing is a cyber attack in which an attacker creates a copy of an existing web page to trick users into submitting personal, financial or password information, making them think that this is the real website that everyone uses. The strategy followed here is an edge server-based anti-phishing algorithm called “Link Guard” uses the property of hyperlinks in phishing attacks. The purpose of this Link Guard algorithm is to find phishing emails sent by phishers to obtain information about end users. Link Guard carefully analyzes the characteristics of phishing hyperlinks. That's why all end users use it using the Link Guard algorithm. By doing this, end users catch and don’t respond tp phishing emails. Because Link Guard is based not only on the detection and prevention of phishing attacks, but also on unknown attacks. This project uses PHP and MySQL server. The program uses a link protection method that detects phishing content based on the characteristics of phishing hyperlinks. In the hyperlink distribution method, important information is collected from victims; Phishers often try to trick users into clicking on hyperlinks embedded in phishing emails. The link protection algorithm works by analyzing the difference between apparent links and real links. The Link Guard algorithm also evaluates similarity to established trustworthy sources. The Link Guard algorithm functions by initially extracting DNS names from both genuine and apparent DNS names, followed by a comparison between the two sets of DNS names.

Keywords : Phishing Detection, Link Guard Algorithm, Emailsecurity, Classification of Phishing Hyperlinks.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe